rhsa-2021_0916
Vulnerability from csaf_redhat
Published
2021-03-17 15:08
Modified
2024-11-22 16:20
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.1
(Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration.
Security Fix(es):
* large slice causes panic in decodeRecord method (CVE-2020-15106)
* DoS in wal/wal.go (CVE-2020-15112)
* directories created via os.MkdirAll are not checked for permissions
(CVE-2020-15113)
* gateway can include itself as an endpoint resulting in resource
exhaustion and leads to DoS (CVE-2020-15114)
* improper validation of passwords allow an attacker to guess or
brute-force user's passwords (CVE-2020-15115)
* no authentication is performed against endpoints provided in the
--endpoints flag (CVE-2020-15136)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration.\n\nSecurity Fix(es):\n\n* large slice causes panic in decodeRecord method (CVE-2020-15106)\n\n* DoS in wal/wal.go (CVE-2020-15112)\n\n* directories created via os.MkdirAll are not checked for permissions\n(CVE-2020-15113)\n\n* gateway can include itself as an endpoint resulting in resource\nexhaustion and leads to DoS (CVE-2020-15114)\n\n* improper validation of passwords allow an attacker to guess or\nbrute-force user\u0027s passwords (CVE-2020-15115)\n\n* no authentication is performed against endpoints provided in the\n--endpoints flag (CVE-2020-15136)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0916", "url": "https://access.redhat.com/errata/RHSA-2021:0916" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0916.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update", "tracking": { "current_release_date": "2024-11-22T16:20:32+00:00", "generator": { "date": "2024-11-22T16:20:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0916", "initial_release_date": "2021-03-17T15:08:12+00:00", "revision_history": [ { "date": "2021-03-17T15:08:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-17T15:08:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:20:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.src", "product": { "name": "etcd-0:3.3.23-1.el8ost.src", "product_id": "etcd-0:3.3.23-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src" }, "product_reference": "etcd-0:3.3.23-1.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15106", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868883" } ], "notes": [ { "category": "description", "text": "A flaw was found In etcd, where a large slice causes panic in the decodeRecord method. The size of a record is stored in the length field of a WAL file, and no additional validation is performed on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: Large slice causes panic in decodeRecord method", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only.\n* In Red Hat OpenStack Platform (RHOSP), the use of etcd is limited to the internal API network, which is not accessible to OpenStack tenants.\n\nThe security impact for these products is therefore rated as Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15106" }, { "category": "external", "summary": "RHBZ#1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15106", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: Large slice causes panic in decodeRecord method" }, { "cve": "CVE-2020-15112", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868872" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it is possible to have an entry index greater than the number of entries in the ReadAll method in wal/wal.go. This can cause issues when WAL entries are being read during consensus, as an arbitrary etcd consensus participant can go down from a runtime panic when reading the entry. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: DoS in wal/wal.go", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact of this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15112" }, { "category": "external", "summary": "RHBZ#1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: DoS in wal/wal.go" }, { "cve": "CVE-2020-15113", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868870" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: directories created via os.MkdirAll are not checked for permissions", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15113" }, { "category": "external", "summary": "RHBZ#1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: directories created via os.MkdirAll are not checked for permissions" }, { "cve": "CVE-2020-15114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868874" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where the etcd gateway is a simple TCP proxy that allows basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This issue results in a denial of service since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat OpenShift Container Platform (RHOCP), the vulnerable ectd is used in the ose-etcd-container. The etcd gateway uses version 2 API which is not used by OCP, hence the impact of this vulnerability is Low.\nIn Red Hat OpenStack Platform (RHOSP) does not use the etcd gateway and as well its use is limited to within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15114" }, { "category": "external", "summary": "RHBZ#1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS" }, { "cve": "CVE-2020-15115", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868878" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users\u0027 passwords with little computational effort. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenShift Container Platform (RHOCP) doesn\u0027t use etcd role-based access control (rbac), instead of that, OpenShift OAuth authentication is used. Therefore, RHOCP is not affected by this vulnerability.\nA similar configuration is in place in Red Hat OpenStack Platform (RHOSP) as etcd does not use a password for access and instead uses a TLS certificate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15115" }, { "category": "external", "summary": "RHBZ#1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15115", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15115" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords" }, { "cve": "CVE-2020-15136", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868880" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. The gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: no authentication is performed against endpoints provided in the --endpoints flag", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants. Additionally, RHOSP does not use the etcd gateway.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15136" }, { "category": "external", "summary": "RHBZ#1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15136", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: no authentication is performed against endpoints provided in the --endpoints flag" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.